#2 open
Gaspard Bucher

[SECURITY] use taint/untaint before execution of custom sql

Reported by Gaspard Bucher | September 3rd, 2008 @ 12:44 PM | in 1.0

Using ruby's tain/untaint mechanism could ensure that we never get "dirty" strings in the SQL.

Everything is carefully quoted, "to_i" or protected using connection.quote(), so it should not be too hard to implement and make sure "to_i", connection.quote and other clearing methods "untaint".

Comments and changes to this ticket

Please Sign in or create a free account to add a new ticket.

With your very own profile, you can contribute to projects, track your activity, watch tickets, receive and update tickets through your email and much more.

New-ticket Create new ticket

Create your profile

Help contribute to this project by taking a few moments to create your personal profile. Create your profile »

Anyone knows how to use formatting here ?

Git repository: http://github.com/zena

Official website: http://zenadmin.org

Shared Ticket Bins

People watching this ticket

Tags

Pages